Latest CVE Feed
-
5.5
MEDIUMCVE-2025-30642
A link following vulnerability in Trend Micro Deep Security 20.0 agents could allow a local attacker to create a denial of service (DoS) situation on affected installations. Please note: an attacker must first obtain the ability to execute low-privileg... Read more
Affected Products : deep_security_agent- Published: Jun. 17, 2025
- Modified: Jun. 18, 2025
- Vuln Type: Denial of Service
-
7.8
HIGHCVE-2025-30641
A link following vulnerability in the anti-malware solution portion of Trend Micro Deep Security 20.0 agents could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execut... Read more
Affected Products : deep_security_agent- Published: Jun. 17, 2025
- Modified: Jun. 18, 2025
- Vuln Type: Authorization
-
7.8
HIGHCVE-2025-30640
A link following vulnerability in Trend Micro Deep Security 20.0 agents could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target s... Read more
Affected Products : deep_security_agent- Published: Jun. 17, 2025
- Modified: Jun. 18, 2025
- Vuln Type: Authorization
-
5.5
MEDIUMCVE-2025-5141
A binary in the BoKS Server Agent component of Fortra's Core Privileged Access Manager (BoKS) on versions 7.2.0 (up to 7.2.0.17), 8.1.0 (up to 8.1.0.22), 8.1.1 (up to 8.1.1.7), 9.0.0 (up to 9.0.0.1) and also legacy tar installs of BoKS 7.2 without hotfix ... Read more
Affected Products :- Published: Jun. 17, 2025
- Modified: Jun. 17, 2025
- Vuln Type: Information Disclosure
-
8.8
HIGHCVE-2025-49847
llama.cpp is an inference of several LLM models in C/C++. Prior to version b5662, an attacker‐supplied GGUF model vocabulary can trigger a buffer overflow in llama.cpp’s vocabulary‐loading code. Specifically, the helper _try_copy in llama.cpp/src/vocab.cp... Read more
- Published: Jun. 17, 2025
- Modified: Aug. 27, 2025
- Vuln Type: Memory Corruption
-
2.9
LOWCVE-2025-45526
A denial of service (DoS) vulnerability has been identified in the JavaScript library microlight version 0.0.7. This library, used for syntax highlighting, does not limit the size of textual content it processes in HTML elements with the microlight class.... Read more
Affected Products :- Published: Jun. 17, 2025
- Modified: Jun. 26, 2025
- Vuln Type: Denial of Service
-
4.3
MEDIUMCVE-2025-45525
A NULL pointer dereference vulnerability has been identified in the JavaScript library microlight version 0.0.7, a lightweight syntax highlighting library. When processing elements with non-standard CSS color values, the library fails to validate the resu... Read more
Affected Products :- Published: Jun. 17, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Denial of Service
-
7.1
HIGHCVE-2025-30680
A Server-side Request Forgery (SSRF) vulnerability in Trend Micro Apex Central (SaaS) could allow an attacker to manipulate certain parameters leading to information disclosure on affected installations. Please note: this vulnerability only affects t... Read more
Affected Products : apex_central- Published: Jun. 17, 2025
- Modified: Jun. 17, 2025
- Vuln Type: Server-Side Request Forgery
-
6.5
MEDIUMCVE-2025-30679
A Server-side Request Forgery (SSRF) vulnerability in Trend Micro Apex Central (on-premise) modOSCE component could allow an attacker to manipulate certain parameters leading to information disclosure on affected installations.... Read more
Affected Products : apex_central- Published: Jun. 17, 2025
- Modified: Jun. 17, 2025
- Vuln Type: Server-Side Request Forgery
-
6.5
MEDIUMCVE-2025-30678
A Server-side Request Forgery (SSRF) vulnerability in Trend Micro Apex Central (on-premise) modTMSM component could allow an attacker to manipulate certain parameters leading to information disclosure on affected installations.... Read more
Affected Products : apex_central- Published: Jun. 17, 2025
- Modified: Jun. 17, 2025
- Vuln Type: Server-Side Request Forgery
-
6.5
MEDIUMCVE-2024-40570
SQL Injection vulnerability in SeaCMS v.12.9 allows a remote attacker to obtain sensitive information via the admin_datarelate.php component.... Read more
Affected Products : seacms- Published: Jun. 17, 2025
- Modified: Jun. 23, 2025
- Vuln Type: Injection
-
8.4
HIGHCVE-2025-49850
A Heap-based Buffer Overflow vulnerability exists within the parsing of PRJ files. The issues result from the lack of proper validation of user-supplied data, which can result in different memory corruption issues within the application, such as reading a... Read more
Affected Products :- Published: Jun. 17, 2025
- Modified: Jun. 17, 2025
- Vuln Type: Memory Corruption
-
8.4
HIGHCVE-2025-49849
An Out-of-bounds Read vulnerability exists within the parsing of PRJ files. The issues result from the lack of proper validation of user-supplied data, which can result in different memory corruption issues within the application, such as reading and writ... Read more
Affected Products :- Published: Jun. 17, 2025
- Modified: Jun. 17, 2025
- Vuln Type: Memory Corruption
-
8.4
HIGHCVE-2025-49848
An Out-of-bounds Write vulnerability exists within the parsing of PRJ files. The issues result from the lack of proper validation of user-supplied data, which can result in different memory corruption issues within the application, such as reading and wri... Read more
Affected Products :- Published: Jun. 17, 2025
- Modified: Jun. 17, 2025
- Vuln Type: Memory Corruption
-
6.8
MEDIUMCVE-2025-49487
An uncontrolled search path vulnerability in the Trend Micro Worry-Free Business Security Services (WFBSS) agent could have allowed an attacker with physical access to a machine to execute arbitrary code on affected installations. An attacker must have... Read more
Affected Products : worry-free_business_security_services- Published: Jun. 17, 2025
- Modified: Jun. 17, 2025
-
6.7
MEDIUMCVE-2025-49158
An uncontrolled search path vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalation privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code ... Read more
- Published: Jun. 17, 2025
- Modified: Jun. 17, 2025
- Vuln Type: Authorization
-
7.8
HIGHCVE-2025-49157
A link following vulnerability in the Trend Micro Apex One Damage Cleanup Engine could allow a local attacker to escalation privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on t... Read more
- Published: Jun. 17, 2025
- Modified: Jun. 17, 2025
- Vuln Type: Authorization
-
7.0
HIGHCVE-2025-49156
A link following vulnerability in the Trend Micro Apex One scan engine could allow a local attacker to escalation privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target ... Read more
- Published: Jun. 17, 2025
- Modified: Jun. 17, 2025
- Vuln Type: Authorization
-
8.8
HIGHCVE-2025-49155
An uncontrolled search path vulnerability in the Trend Micro Apex One Data Loss Prevention module could allow an attacker to inject malicious code leading to arbitrary code execution on affected installations.... Read more
- Published: Jun. 17, 2025
- Modified: Jun. 17, 2025
- Vuln Type: Injection
-
8.7
HIGHCVE-2025-49154
An insecure access control vulnerability in Trend Micro Apex One and Trend Micro Worry-Free Business Security could allow a local attacker to overwrite key memory-mapped files which could then have severe consequences for the security and stability of aff... Read more
- Published: Jun. 17, 2025
- Modified: Jun. 17, 2025
- Vuln Type: Authorization